Stage 4: Intermediate Zero Trust
According to the 2024 CDW Cybersecurity Research report, only 47 percent of IT leaders surveyed say they are very confident that they have sufficient visibility into their organizations’ cybersecurity landscapes. The rest would like to see a clearer view into their entire IT ecosystem so they can assess fault lines between integrations, network connections, etc. before a threat escalates.
This intermediate stage can encompass the second stage of the CISA maturity model, in which “automation is introduced,” according to Candillo. “This includes attribute assignment and configuration of lifecycles, policy decisions and enforcement, and initial cross-pillar solutions with integration of external systems.”
Organizations at this intermediate stage are also actively planning and evaluating their security posture in relation to zero-trust principles. They are conducting assessments and gap analyses to identify areas of improvement and are developing strategies and roadmaps for further zero-trust adoption.
“Tools such as effective identity and access management solutions are necessary, but they must be deployed strategically and integrated with other elements, such as data governance,” Candillo and other CDW experts write in another white paper. “Among the most critical use cases for zero trust are implementing principles within an organization’s backup and recovery systems, enhancing the secure experience of remote workers and securing complex cloud infrastructures.”
RELATED: Try a rapid zero-trust maturity assessment.
Stage 5: Advanced Zero Trust
At this stage, organizations have already integrated multiple zero-trust components into their security infrastructure and have an ongoing monitoring and optimization process in place. They are running continuous monitoring, so threat detection and response capabilities are part of security operations.
Emphasizing centralized visibility and identity control, dynamic policies based on automated or observed triggers, and alignment with open standards for cross-functional interoperability, this stage can encompass the final two levels of the CISA maturity model.
In transitioning to this stage, organizations will “find that their solutions rely more heavily upon automated processes, systems are integrated across pillars, and they become more dynamic in their policy enforcement decisions,” according to Candillo.
READ MORE: Build a zero-trust model for your network.
Organizations that achieve this highest level of maturity have fully embraced the zero-trust model as part of their security culture. But those who aren’t there yet can take a number of steps to improve, including gap analyses, benchmarking, self-assessments and a rapid maturity assessment. And no matter the stage, help is available for organizations to develop roadmaps, budgets and security policies to push forward.